Sciweavers

962 search results - page 153 / 193
» On Alarm Protocol in Wireless Sensor Networks
Sort
View
RTSS
2003
IEEE
15 years 9 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
ACSAC
2007
IEEE
15 years 8 months ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...
FMICS
2010
Springer
15 years 4 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó
TRIDENTCOM
2010
IEEE
15 years 2 months ago
From Kansei to KanseiGenie: Architecture of Federated, Programmable Wireless Sensor Fabrics
Abstract. This paper deals with challenges in federating wireless sensing fabrics. Federations of this sort are currently being developed in next generation global end-to-end exper...
Mukundan Sridharan, Wenjie Zeng, William Leal, Xi ...
SASN
2006
ACM
15 years 10 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...